Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe
-
Size
456KB
-
MD5
fc15326ddaf01200000a838ecfe623ef
-
SHA1
d885ecfb2138fb1438a0d1f0649e6e2a80fe57b9
-
SHA256
2ca094db1a6cda14bfd35e622435d2e3d3c3ae250dd1dbe7678af369e54d938f
-
SHA512
52e23d093d33ee34c909eb12f17805bb1c53904766a2ab59c7a3d3fe790b829669f71da161603383446ee247a2df1f803d3865b2b7b477c4e63002ba507c8833
-
SSDEEP
6144:JpBCmZk8q2ofpz33ZeMfOoqHNQ73sJH9Dwxo4LSZ4y61bPWTSLG+h5vrgAvBHyqv:Jnvq2apDZeMfOqA9DuyQi2LDjP
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000BDF9CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000BDF9CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000BDF9CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000BDF9CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000BDF9CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2936 043A6A5B00014973000BDF9CB4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 043A6A5B00014973000BDF9CB4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000BDF9CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000BDF9CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000BDF9CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000BDF9CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000BDF9CB4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000BDF9CB4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000BDF9CB4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6A5B00014973000BDF9CB4EB2331 = "C:\\ProgramData\\043A6A5B00014973000BDF9CB4EB2331\\043A6A5B00014973000BDF9CB4EB2331.exe" 043A6A5B00014973000BDF9CB4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2936 043A6A5B00014973000BDF9CB4EB2331.exe 2936 043A6A5B00014973000BDF9CB4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2936 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe 28 PID 2880 wrote to memory of 2936 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe 28 PID 2880 wrote to memory of 2936 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe 28 PID 2880 wrote to memory of 2936 2880 fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\ProgramData\043A6A5B00014973000BDF9CB4EB2331\043A6A5B00014973000BDF9CB4EB2331.exe"C:\ProgramData\043A6A5B00014973000BDF9CB4EB2331\043A6A5B00014973000BDF9CB4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\fc15326ddaf01200000a838ecfe623ef_JaffaCakes118.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD5fc15326ddaf01200000a838ecfe623ef
SHA1d885ecfb2138fb1438a0d1f0649e6e2a80fe57b9
SHA2562ca094db1a6cda14bfd35e622435d2e3d3c3ae250dd1dbe7678af369e54d938f
SHA51252e23d093d33ee34c909eb12f17805bb1c53904766a2ab59c7a3d3fe790b829669f71da161603383446ee247a2df1f803d3865b2b7b477c4e63002ba507c8833